The Cloud-based Water Parameter Monitoring System leverages cloud and IoT technologies for the precise monitoring of water quality across various water bodies. In Bangladesh, fish is a vital dietary component, consume...
详细信息
The detection of reconnaissance attacks is crucial for safeguarding Internet of Things (IoT) environments, which are inherently more vulnerable and resource-constrained compared to traditional computing systems. Tradi...
详细信息
In the economy where trade and finance are closely linked it is essential to accurately identify and authenticate various currencies, especially in industries such, as banking, tourism and retail. Conventional methods...
详细信息
Real-time object identification applications are using methods for image processing more and more as a result of advancements in computer technology. Results for pedestrian identification were improved by the use of d...
详细信息
Social media platforms have become essential tools for communication, collaboration, and exchanging information, ideas, and knowledge among users worldwide. Despite their benefits, the anonymity offered by these platf...
详细信息
Anxiety is a common mental disorder that affects millions of people worldwide. Anxiety can be detected using physiological signals such as heart rate, skin conductance, blood pressure, and respiration. Machine learnin...
详细信息
Abnormal heart rhythm or irregular heartbeat, often known as arrhythmia. It is a kind of cardiovascular illness that necessitates a precise and fast diagnosis. Because of its simplicity and non-invasive nature, an ele...
详细信息
Smartphones are increasingly vital to people on a daily basis. Telephones are utilized in all aspects of life, ranging from personal to professional, due to technological advancements. It serves a function beyond maki...
详细信息
The complexity of attacks is increasing, making it increasingly difficult to effectively discover breaches. A network intrusion detection system is needed to handle the aforementioned problem. An automated software pr...
详细信息
Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection ba...
详细信息
暂无评论